Countable Connected Search Results

How To: Create a wifi hotspot for Mac, iPod Touch, and/or PSP

In this video tutorial, learn how to make a wireless Internet hotspot with the following: a Mac computer, an ethernet cable (connected to your modem), and an airport. This video will releave you of the need to deal with a router. Once completed, you will have you're very own wifi hotspot that will work on your iPod Touch (1st & 2nd generation), your Sony PSP (PSP 1000, 2000, & 3000 series), and anything else that has wifi compatibility.

How To: Tether iPhone 3G to use as a wireless modem

This is a video demonstration on how to tether your iPhone 3G to a Mac laptop to use the 3G network for surfing the web on the laptop. This is against AT&T's policy so try at your own risk. This is in place of the NetShare app that keeps getting removed by Apple or ATT. This let's you connect your computer to the 3G wireless network by using a proxy on your jailbroken iPhone.

How To: Charge the R/C Micro Mosquito Firefly Bladerunner

A lot of customers thought that one can place the Micro Mosquito on the base (which looks like a Helicopter Landing Pad) and it will be charged. No, there is a charging cord underneath the charging base that is used. All you need to do is to unlatch the cover and connect to the Mirco Mosquito. When connected properly, the green LED light will flash and once charged, the green LED will stop flashing. This video walks you through the process.

How To: Tie a single fisherman's knot for climbing

This knot is common in the climbing world. We use it to secure two ropes together. Often used to form a loop on a prussik (cordalette) to construct an anchor. Can also be used to connect two ropes to rappel. This knot has many applications in the real world not just climbing.

How To: Disable This Wi-Fi Option on Your iPhone to Increase Security & Prevent Unresponsive Apps & Webpages

You're out and about, and nothing on your iPhone will load. A glance at the settings shows a saved Wi-Fi network with full bars that your iPhone had connected to automatically, but you're not getting any internet. If you've experienced this, you're not alone, and there's something you can do about it. You'll even increase privacy and security on your iPhone in the process.

How to Hack with Arduino: Building MacOS Payloads for Inserting a Wi-Fi Backdoor

Arduino is a language that's easy to learn and supported on many incredibly low-cost devices, two of which are the $2 Digispark and a $3 ESP8266-based board. We can program these devices in Arduino to hijack the Wi-Fi data connection of any unlocked macOS computer in seconds, and we can even have it send data from the target device to our low-cost evil access point.

How To: Play Apex Legends on Your Phone Right Now

With EA chief executive Andrew Wilson stating the official mobile version of Apex Legends won't arrive until the 2021 fiscal year, fans have to wait at least another year to enjoy their favorite battle royale game on the go. But for those who can't wait, there are ways to play the game on iPhone and Android right now.

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

News: How to Start a Fire with a Lemon

There's no doubt you've heard the old saying, "When life gives you lemons, make lemonade." The phrase was penned in an obituary to a dwarf actor in 1915 by an anarchist named Elbert Hubbard, who lost his life five months later aboard the RMS Lusitania when it was torpedoed by a German submarine.

Hack Like a Pro: How to Create a Nearly Undetectable Backdoor with Cryptcat

Welcome back, my fledgling hackers! Awhile back, I demonstrated one of my favorite little tools, netcat, which enables us to create a connection between any two machines and transfer files or spawn a command shell for "owning" the system. Despite the beauty and elegance of this little tool, it has one major drawback—the transfers between the computers can be detected by security devices such as firewalls and an intrusion detection system (IDS).

Robot Basics: Using an H Bridge to Move Your Bot Backwards

I love robots. They have the potential to evolve into Asimovian destroyers of the human species, but have only just mastered the art of cleaning my rug. They have an ever increasing cool factor and a growing number of cheap and simple components that let the hobby roboticist reach for the burning miasmas of plasma. But to get to the stars, we need to start with the basics.

How To: Use the ZBF2L algorithms to solve the Rubik's Cube

This video tutorial is for beginner puzzlers who are getting more advanced in their speedsolving of the Rubik's Cube. When solving the Rubiks Cube, there are these mathematical equations called algorithms, which I'm sure you already know. With an endless supply of them out there for this puzzle, how can you possibly remember them all? By watching videos, that's how. This one will help teach you how to use the ZBF2L algorithms to solve the Rubik's Cube. What is the ZBF2L? It's the ZB Method of...